Sciweavers

1618 search results - page 136 / 324
» Testing random number generators
Sort
View
IMC
2004
ACM
14 years 3 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
CN
2004
107views more  CN 2004»
13 years 10 months ago
A multicriteria handoff decision scheme for the next generation tactical communications systems
In this paper a novel handoff decision algorithm for the mobile subsystem of tactical communications systems is introduced. In this algorithm, handoff decision metrics are: receiv...
Tolga Onel, Cem Ersoy, Erdal Cayirci, Gerard Parr
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 4 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
MSWIM
2004
ACM
14 years 3 months ago
Outdoor experimental comparison of four ad hoc routing algorithms
Most comparisons of wireless ad hoc routing algorithms involve simulated or indoor trial runs, or outdoor runs with only a small number of nodes, potentially leading to an incorre...
Robert S. Gray, David Kotz, Calvin C. Newport, Nik...
ATAL
2009
Springer
13 years 11 months ago
Efficient physics-based planning: sampling search via non-deterministic tactics and skills
Motion planning for mobile agents, such as robots, acting in the physical world is a challenging task, which traditionally concerns safe obstacle avoidance. We are interested in p...
Stefan Zickler, Manuela M. Veloso